MIDTERM EXAM CTS1650
What is the IP Address of the switch virtual interface (SVI) on switch0?
192.168.5.10
Refer to the exhibit. Match the packets with their destination IP address to the exiting interfaces on the router. (Not all targets are used.) packets with destination of 172.17.10.5 packets with destination of 172.17.12.10 packets with destination of 172.17.14.8 packets with destination of 172.17.8.20 packets with destination of 172.17.6.15 FastEthernet0/0 FastEthernet0/1 FastEthernet1/0 FastEthernet1/1 Serial0/0/0 The packet is dropped.
FastEthernet0/0-packets with destination of 172.17.6.15 FastEthernet0/1-packets with destination of 172.17.14.8 FastEthernet1/0-packets with destination of 172.17.12.10 FastEthernet1/1-packets with destination of 172.17.10.5 Serial0/0/0-packets with destination of 172.17.8.20
Which statement describes a feature of the IP protocol? IP relies on upper layer services to handle situations of missing or out-of-order packets. MAC addresses are used during the IP packet encapsulation. IP encapsulation is modified based on network media. IP relies on Layer 2 protocols for transmission error control.
IP relies on upper layer services to handle situations of missing or out-of-order packets.
Refer to the graphic. What type of cabling is shown? STP fiber coax UTP
fiber
What OSI physical layer term describes the measure of usable data transferred over a given period of time? goodput air fiber-optic cable copper cable
goodput
What routing table entry has a next hop address associated with a destination network? local routes remote routes C and L source routes directly-connected routes
remote routes
When IPv4 addressing is manually configured on a web server, which property of theIPv4 configuration identifies the network and host portion for an IPv4 address?
subnet mask
With the use of unshielded twisted-pair copper wire in a network, what causes crosstalk within the cable pairs? the magnetic field around the adjacent pairs of wire the use of braided wire to shield the adjacent wire pairs the reflection of the electrical wave back from the far end of the cable the collision caused by two nodes trying to use the media simultaneously
the magnetic field around the adjacent pairs of wire
Which interface allows remote management of a Layer 2 switch?
the switch virtual interface
Which two statements are true regarding the user EXEC mode? (Choose two.)
✓ The device prompt for this mode ends with the ">" symbol. ✓ Only some aspects of the router configuration can be viewed.
What are two potential network problems that can result from ARP operation? (Choose two.) On large networks with low bandwidth, multiple ARP broadcasts could cause data communication delays. Network attackers could manipulate MAC address and IP address mappings in ARP messages with the intent of intercepting network traffic. Large numbers of ARP request broadcasts could cause the host MAC address table to overflow and prevent the host from communicating on the network. Manually configuring static ARP associations could facilitate ARP poisoning or MAC address spoofing. Multiple ARP replies result in the switch MAC address table containing entries that match the MAC addresses of hosts that are connected to the relevant switch port.
-On large networks with low bandwidth, multiple ARP broadcasts could cause data communication delays. -Network attackers could manipulate MAC address and IP address mappings in ARP messages with the intent of intercepting network traffic.
Which three commands are used to set up secure access to a router through a connection to the console interface? (Choose three.) line vty 0 4 enable secret cisco login password cisco interface fastethernet 0/0 line console 0
-line console 0 -login -password cisco
Refer to the exhibit. What is the destination MAC address of the Ethernet frame as it leaves the web server if the final destination is PC1? 00-60-2F-3A-07-AA 00-60-2F-3A-07-DD 00-60-2F-3A-07-CC 00-60-2F-3A-07-BB
00-60-2F-3A-07-CC
Which is a multicast MAC address? 5C-26-0A-4B-19-3E 01-00-5E-00-00-03 00-26-0F-4B-00-3E FF-FF-FF-FF-FF-FF
01-00-5E-00-00-03
The PC is connected to the console port of the switch. All the other connections are made through Fast Ethernet links. Which types of UTP cables can be used to connect the devices? 1 - rollover, 2 - crossover, 3 - straight-through 1 - rollover, 2 - straight-through, 3 - crossover 1 - crossover, 2 - rollover, 3 - straight-through 1 - crossover, 2 - straight-through, 3 - rollover
1 - rollover, 2 - straight-through, 3 - crossover
For the TCP/IP protocol suite, what is the correct order of events when a Telnet message is being prepared to be sent over the network?
1. Telnet-formatted data is provided to the next layer 2. TCP header is added 3. IP header is added 4. Ethernet header is added
An administrator is configuring a switch console port with a password. In what order will the administrator travel through the IOS modes of operation in order to reach the mode in which the configuration commands will be entered? (Not all options are used.) privileged EXEC mode -> second mode line configuration mode -> final mode global configuration mode -> third mode user EXEC mode -> first mode
1.user EXEC mode 2.privileged EXEC mode 3.global configuration mode 4.line configuration mode
Refer to the exhibit. A user PC has successfully transmitted packets to www.cisco.com. Which IP address does the user PC target in order to forward its data off the local network? 172.20.1.18 172.24.255.17 172.24.1.22 172.24.255.4 172.20.0.254
172.20.0.254
Floor(config)# interface gi0/1Floor(config-if)# description Connects to the Registrar LANFloor(config-if)# ip address 192.168.235.234 255.255.255.0Floor(config-if)# no shutdownFloor(config-if)# interface gi0/0Floor(config-if)# description Connects to the Manager LANFloor(config-if)# ip address 192.168.234.114 255.255.255.0Floor(config-if)# no shutdownFloor(config-if)# interface s0/0/0Floor(config-if)# description Connects to the ISPFloor(config-if)# ip address 10.234.235.254 255.255.255.0Floor(config-if)# no shutdownFloor(config-if)# interface s0/0/1Floor(config-if)# description Connects to the Head Office WANFloor(config-if)# ip address 203.0.113.3 255.255.255.0Floor(config-if)# no shutdownFloor(config-if)# endRefer to the exhibit. A network administrator is connecting a new host to the Registrar LAN. The host needs to communicate with remote networks. What IP address would be configured as the default gateway on th
192.168.235.234
What property of ARP allows MAC addresses of frequently used servers to be fixed in the ARP table? The source MAC address appears in the header of the Ethernet frame. A static IP-to-MAC address entry can be entered manually into an ARP table. The destination MAC address FF-FF-FF-FF-FF-FF appears in the header of the Ethernet frame. The port-to-MAC address table on a switch has the same entries as the ARP table on the switch.
A static IP-to-MAC address entry can be entered manually into an ARP table.
Where are IPv4 address to Layer 2 Ethernet address mappings maintained on a host computer? routing table MAC address table ARP cache neighbor table
ARP cache
What statement describes the function of the Address Resolution Protocol? ARP is used to discover the IP address of any host on a different network. ARP is used to discover the IP address of any host on the local network. ARP is used to discover the MAC address of any host on a different network. ARP is used to discover the MAC address of any host on the local network.
ARP is used to discover the MAC address of any host on the local network.
What term describes the ability to use personal devices across a business or a business network?
BYOD
What happens when the transport input ssh command is entered on the switch vty lines? The SSH client on the switch is enabled. The switch requires remote connections via a proprietary client software. The switch requires a username/password combination for remote access. Communication between the switch and remote users is encrypted.
Communication between the switch and remote users is encrypted.
Which two functions are performed at the MAC sublayer of the OSI data link layer? (Choose two.) Adds Layer 2 control information to network protocol data. Enables IPv4 and IPv6 to utilize the same network interface and media. Implements a trailer to detect transmission errors. Places information in the frame that identifies which network layer protocol is being used for the frame. Controls the NIC responsible for sending and receiving data on the physical medium.
Controls the NIC responsible for sending and receiving data on the physical medium Implements a trailer to detect transmission errors.
What process involves placing one PDU inside of another PDU?
Encapsulation
A web client is receiving a response for a web page from a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to decode the received transmission?
Ethernet, IP, TCP, HTTP
A new network administrator has been asked to enter a banner message on a Cisco device. What is the fastest way a network administrator could test whether the banner is properly configured? Power cycle the device. Reboot the device. Enter CTRL-Z at the privileged mode prompt. Exit global configuration mode. Exit privileged EXEC mode and press Enter .
Exit privileged EXEC mode and press Enter.
Which destination address is used in an ARP request frame? 255.255.255.255 AAAA.AAAA.AAAA the physical address of the destination host 0.0.0.0 FFFF.FFFF.FFFF
FFFF.FFFF.FFFF
Which port does Switch0 use to send frames to the host with the IPv4 address 10.1.1.5? Fa0/1 Fa0/5 Fa0/9 Fa0/11
Fa0/11
When transporting data from real-time applications, such as streaming audio and video, which field in the IPv6 header can be used to inform the routers and switches to maintain the same path for the packets in the same conversation? Differentiated Services Next Header Flow Label Traffic Class
Flow Label
Which three acronyms/initialisms represent standards organizations? (Choose three.)
IANA IEEE IETF
Match the description to the following organization?
ISOC - This organization promotes the open development, evolution, and use of the Internet throughout the world. ISO - This organization is the largest developer of international standards in the world for a wide variety of products and services. It is known for its Open Systems Interconnection (OSI) reference model. EIA - None IANA - This organization is responsible for overseeing and managing IP address allocation, domain name management, and protocol identifiers
While trying to solve a network issue, a technician made multiple changes to the current router configuration file. The changes did not solve the problem and were not saved. What action can the technician take to discard the changes and work with the file in NVRAM?
Issue the reload command without saving the running configuration.
Which statement is true about the running configuration file in a Cisco IOS device?
It affects the operation of the device immediately when modified.
What are three characteristics of an SVI? (Choose three.)
It is not associated with any physical interface on a switch. It provides a means to remotely manage a switch. It is associated with VLAN1 by default.
Refer to the exhibit. Consider the IP address configuration shown from PC1. What is a description of the default gateway address? It is the IP address of the Router1 interface that connects the company to the Internet. It is the IP address of the Router1 interface that connects the PC1 LAN to Router1. It is the IP address of the ISP network device located in the cloud. It is the IP address of Switch1 that connects PC1 to other devices on the same LAN.
It is the IP address of the Router1 interface that connects the PC1 LAN to Router1.
Which two statements describe the services provided by the data link layer? (Choose two.) It ensures that application data will be transmitted according to the prioritization. It packages various Layer 3 PDUs into a frame format that is compatible with the network interface. It defines the end-to-end delivery addressing scheme. It provides reliable delivery through link establishment and flow control. It maintains the path between the source and destination devices during the data transmission. It manages the access of frames to the network media. Navigation Bar
It manages the access of frames to the network media. It packages various Layer 3 PDUs into a frame format that is compatible with the network interface.
What is a characteristic of the LLC sublayer? It places information in the frame allowing multiple Layer 3 protocols to use the same network interface and media. It provides delimitation of data according to the physical signaling requirements of the medium. It provides the logical addressing required that identifies the device. It defines software processes that provide services to the physical layer. Navigation Bar
It places information in the frame allowing multiple Layer 3 protocols to use the same network interface and media.
Which two statements describe features or functions of the logical link control sublayer in Ethernet standards? (Choose two.) Logical link control is implemented in software. The data link layer uses LLC to communicate with the upper layers of the protocol suite. The LLC sublayer adds a header and a trailer to the data. The LLC sublayer is responsible for the placement and retrieval of frames on and off the media. Logical link control is specified in the IEEE 802.3 standard. Navigation Bar
Logical link control is implemented in software. The data link layer uses LLC to communicate with the upper layers of the protocol suite.
What are three ways that media access control is used in networking? (Choose three.) 802.11 utilizes CSMA/CD. Media access control provides placement of data frames onto the media. Data link layer protocols define the rules for access to different media. Ethernet utilizes CSMA/CD. Networks with controlled access have reduced performance due to data collisions. Contention-based access is also known as deterministic. Navigation Bar
Media access control provides placement of data frames onto the media. Data link layer protocols define the rules for access to different media. Ethernet utilizes CSMA/CD.
Match the commands to the correct actions. (Not all options are used.) provides security on the console displays a message when the router is accessed configures a name on the router Router(config)# hostname CL1 Router(config)# enable password Cisco Router(config-line)# password class Router(config)# password Cisco Router(config)# banner motd #
Provides security on the console --- Router(config-line)# password class Displays a message when the router is accessed - Router(config)# banner motd Configures a name on the router --- Router(config)# hostname CL1
Perform the tasks in the activity instructions and then answer the question.Which interfaces in each router are active and operational? R1: G0/1 and S0/0/1R2: G0/0 and S0/0/1 R1: G0/0 and S0/0/0R2: G0/1 and S0/0/0 R1: G0/0 and S0/0/0R2: G0/0 and S0/0/0 R1: G0/0 and S0/0/1R2: G0/1 and S0/0/1
R1: G0/0 and S0/0/0R2: G0/1 and S0/0/0
Match the command with the device mode at which the command is entered. (Not all options are used.) login service password-encryption ip address 192.168.4.4 255.255.255.0 copy running-config startup-config enable R1(config)# R1> R1(config-router)# R1# R1(config-line)# R1(config-if)#
R1> enable R1# copy running-config startup-config R1(config-line)# login R1(config-if)# ip address 192.168.4.4 255.255.255.0 R1(config)# service password-encryption
Which two host names follow the guidelines for naming conventions on Cisco IOS devices? (Choose two.)
RM-3-Switch-2A4 SwBranch799
What term describes a type of network used by people who work from home or from a small remote office?
SOHO network
which statement accurately describes a tcp/ip encapsulation process when a pc is sending data to the network?
Segments are sent from the transport layer to the internet layer.
Refer to the exhibit. ServerB is attempting to contact HostA. Which two statements correctly identify the addressing that ServerB will generate in the process? (Choose two.)
ServerB will generate a frame with the destination MAC address of RouterB. ServerB will generate a packet with the destination IP address of HostA.
Refer to the exhibit. An administrator is trying to configure the switch but receives the error message that is displayed in the exhibit. What is the problem?
The administrator must first enter privileged EXEC mode before issuing the command.
A computer can access devices on the same network but cannot access devices on other networks. What is the probable cause of this problem? The cable is not connected properly to the NIC. The computer has an invalid IP address. The computer has an invalid default gateway address. The computer has an incorrect subnet mask.
The computer has an invalid default gateway address.
What are two characteristics of RAM on a cisco device?
The configuration that is actively running on the device is stored in RAM. The contents of RAM are lost during a power cycle.
What is the effect of using the Router# copy running-config startup-config command on a router? The contents of flash will change. The contents of RAM will change. The contents of ROM will change. The contents of NVRAM will change.
The contents of NVRAM will change.
Within a production network, what is the purpose of configuring a switch with a default gateway address? It provides a next-hop address for all traffic that flows through the switch. Hosts that are connected to the switch can use the switch default gateway address to forward packets to a remote destination. A switch must have a default gateway to be accessible by Telnet and SSH. The default gateway address is used to forward packets originating from the switch to remote networks.
The default gateway address is used to forward packets originating from the switch to remote networks.
Under which two circumstances will a switch flood a frame out of every port except the port that the frame was received on? (Choose two.) The source address in the frame is a multicast address. The destination address in the frame is a known unicast address. The source address in the frame header is the broadcast address. The destination address is unknown to the switch. The frame has the broadcast address as the destination address.
The frame has the broadcast address as the destination address. The destination address is unknown to the switch.
What will happen if the default gateway address is incorrectly configured on a host? The host will have to use ARP to determine the correct address of the default gateway. A ping from the host to 127.0.0.1 would not be successful. The switch will not forward packets initiated by the host. The host cannot communicate with other hosts in the local network. The host cannot communicate with hosts in other networks.
The host cannot communicate with hosts in other networks.
What action will occur if a host receives a frame with a destination MAC address of FF:FF:FF:FF:FF:FF? The host returns the frame to the switch. The host will process the frame. The host forwards the frame to all other hosts. The host replies to the switch with its own IP address.
The host will process the frame.
A network administrator is connecting two modern switches using a straight-through cable. The switches are new and have never been configured. Which three statements are correct about the final result of the connection? (Choose three.) The link between switches will work as full-duplex. The connection will not be possible unless the administrator changes the cable to a crossover cable. If both switches support different speeds, they will each work at their own fastest speed. The duplex capability has to be manually configured because it cannot be negotiated. The auto-MDIX feature will configure the interfaces eliminating the need for a crossover cable. The link between the switches will work at the fastest speed that is supported by both switches.
The link between the switches will work at the fastest speed that is supported by both switches. The link between switches will work as full-duplex. The auto-MDIX feature will configure the interfaces eliminating the need for a crossover cable.
During the encapsulation process, what occurs at the data link layer for a PC connected to an Ethernet network? The logical address is added. The process port number is added. An IP address is added. The physical address is added.
The physical address is added.
The global configuration command ip default-gateway 172.16.100.1 is applied to a switch. What is the effect of this command? The switch can be remotely managed from a host on another network. The switch is limited to sending and receiving frames to and from the gateway 172.16.100.1. The switch will have a management interface with the address 172.16.100.1. The switch can communicate with other hosts on the 172.16.100.0 network.
The switch can be remotely managed from a host on another network.
Refer to the exhibit. What is wrong with the displayed termination? The woven copper braid should not have been removed. The untwisted length of each wire is too long. The wrong type of connector is being used. The wires are too thick for the connector that is used.
The untwisted length of each wire is too long.
what is a characteristic of multicast messages?
They are sent to a select group of hosts.
Which statement describes a characteristic of the frame header fields of the data link layer? They all include the flow control and logical connection fields. Ethernet frame header fields contain Layer 3 source and destination addresses. They vary depending on protocols. They include information on user applications.
They vary depending on protocols.
A network administrator enters the service password-encryption command into the configuration mode of a router. What does this command accomplish?
This command prevents someone from viewing the running configuration passwords.
Which field in the IPv4 header is used to prevent a packet from traversing a network endlessly? Sequence Number Time-to-Live Acknowledgment Number Differentiated Services
Time-to-Live
Refer to the graphic. What type of cabling is shown? STP fiber UTP coax
UTP
What type of communication rule would best describe CSMA/CD? message encoding flow control access method message encapsulation
access method
Which term refers to a network that provides secure access to the corporate offices by suppliers, customers and collaborators?
an extranet
At which OSI layer is data added to a PDU during the encapsulation process?
application layer
What is a basic characteristic of the IP protocol? media dependent user data segmentation reliable end-to-end delivery connectionless Navigation Bar
connectionless
What is a primary role of the Physical layer in transmitting data on the network? create the signals that represent the bits in each frame on to the media provide physical addressing to the devices determine the path packets take through the network control data access to the media
create the signals that represent the bits in each frame on to the media
Which two OSI model layers have the same functionality as a single layer of the TCP/IP model?
data link and physical layers
Which term describes a field in the IPv4 packet header that contains a unicast, multicast, or broadcast address? TTL destination IPv4 address header checksum protocol
destination IPv4 address
What important information is examined in the Ethernet frame header by a Layer 2 device in order to forward the data onward? source IP address destination IP address destination MAC address source MAC address Ethernet type
destination MAC address
What three items are contained in an Ethernet header and trailer? (Choose three.) source IP address source MAC address destination IP address destination MAC address error-checking information
destination MAC address source MAC address error-checking information
Match the definitions to their respective CLI hot keys and shortcuts. (Not all options are used.)
displays the next screen -> space bar scrolls backwards through previously entered commands -> Up Arrow provides context-sensitive help -> ? completes abbreviated commands and parameters -> Tab aborts commands such as trace and ping -> Ctrl-Shift-6
What is one advantage that the IPv6 simplified header offers over IPv4? little requirement for processing checksums smaller-sized source and destination IP addresses efficient packet handling smaller-sized header
efficient packet handling
In addition to the cable length, what two factors could interfere with the communication carried over UTP cables? (Choose two.) signal modulation technique size of the network bandwidth electromagnetic interference crosstalk
electromagnetic interference crosstalk
What is contained in the trailer of a data-link frame? physical address data error detection logical address
error detection
what method can be used by two computers to ensure that packets are not dropped because too much data is being sent too quickly?
flow control
What are two examples of the cut-through switching method? (Choose two.) store-and-forward switching fast-forward switching CRC switching fragment-free switching QOS switching
fragment-free and fast-forward
Which PDU format is used when bits are received from the network medium by the NIC of a host?
frame
Which advantage does the store-and-forward switching method have compared with the cut-through switching method? frame error checking faster frame forwarding collision detecting frame forwarding using IPv4 Layer 3 and 4 information
frame error checking
What makes fiber preferable to copper cabling for interconnecting buildings? (Choose three.) greater distances per cable run lower installation cost limited susceptibility to EMI/RFI durable connections greater bandwidth potential easily terminated
greater bandwidth potential limited susceptibility to EMI/RFI greater distances per cable run
What is one advantage of using the cut-through switching method instead of the store-and-forward switching method? has a lower latency appropriate for high-performance computing applications makes a fast forwarding decision based on the source MAC address of the frame has a positive impact on bandwidth by dropping most of the invalid frames provides the flexibility to support any mix of Ethernet speeds
has a lower latency appropriate for high-performance computing applications
What layer is responsible for routing messages through an internetwork in TCP/IP model?
internet
Refer to the exhibit. A network administrator is configuring access control to switch SW1. If the administrator uses a console connection to connect to the switch, which password is needed to access user EXEC mode?
lineconin
What does the term "attenuation" mean in data communication? loss of signal strength as distance increases leakage of signals from one cable pair to another strengthening of a signal by a networking device time for a signal to reach its destination
loss of signal strength as distance increases
Which two devices commonly affect wireless networks? (Choose two.) microwaves Blu-ray players home theaters incandescent light bulbs external hard drives cordless phones
microwaves cordless phones
Which two types of IPv6 messages are used in place of ARP for address resolution? echo request broadcast neighbor solicitation anycast neighbor advertisement echo reply
neighbor solicitation neighbor advertisement
What layer is responsible for routing messages through an internetwork in the TCP/IP model?
network access
Which two functions are primary functions of a router? (Choose two.) flow control packet forwarding domain name resolution path selection microsegmentation
packet forwarding path selection
A network team is comparing physical WAN topologies for connecting remote sites to a headquarters building. Which topology provides high availability and connects some, but not all, remote sites? hub and spoke partial mesh point-to-point mesh
partial mesh
A Layer 2 switch is used to switch incoming frames from a 1000BASE-T port to a port connected to a 100Base-T network. Which method of memory buffering would work best for this task? level 1 cache buffering fixed configuration buffering shared memory buffering port-based buffering
shared memory buffering
During a routine inspection, a technician discovered that software that was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer?
spyware
Which switching method uses the CRC value in a frame? store-and-forward fragment-free cut-through fast-forward
store-and-forward
Refer to the exhibit. PC1 attempts to connect to File_server1 and sends an ARP request to obtain a destination MAC address. Which MAC address will PC1 receive in the ARP reply? the MAC address of S2 the MAC address of File_server1 the MAC address of S1 the MAC address of the G0/0 interface on R2 the MAC address of the G0/0 interface on R1
the MAC address of the G0/0 interface on R1
What is the purpose of the FCS field in a frame? to obtain the MAC address of the sending node to verify the logical address of the sending node to compute the CRC header for the data field to determine if errors occurred in the transmission and reception
to determine if errors occurred in the transmission and reception
Why would a Layer 2 switch need an IP address? to enable the switch to send broadcast frames to attached PCs to enable the switch to function as a default gateway to enable the switch to be managed remotely to enable the switch to receive frames from attached PCs
to enable the switch to be managed remotely
What are two functions of NVRAM? (Choose two.) to store the ARP table to store the startup configuration file to store the routing table to retain contents when power is removed to contain the running configuration file
to retain contents when power is removed to store the startup configuration file
What are two actions performed by a Cisco switch? (Choose two.) building a routing table that is based on the first IP address in the frame header examining the destination MAC address to add new entries to the MAC address table forwarding frames with unknown destination IP addresses to the default gateway using the source MAC addresses of frames to build and maintain a MAC address table utilizing the MAC address table to forward frames via the destination MAC address
using the source MAC addresses of frames to build and maintain a MAC address table utilizing the MAC address table to forward frames via the destination MAC address